6218 Commits

Author SHA1 Message Date
wuchunyang
f7536fad5e Use Docker healthchecks for solum services
This change enables the use of Docker healthchecks for solum services.
Implements: blueprint container-health-check

Change-Id: If2dba2fc0adcb8587f5a12adb4e8c5e21824586a
2021-03-09 22:11:23 +08:00
Pierre Riteau
0d33a2f598 Document calculation of indentation
Change-Id: I0f107d8239ae0cbef3bb4569ec5d77326f8974fc
2021-03-08 10:29:42 +01:00
Zuul
7c0c4dd6fd Merge "Remove whitespace around equal signs in zookeeper.cfg" 2021-03-07 11:04:54 +00:00
Zuul
4e7d1ab9cb Merge "Add variable for changing Apache HTTP timeout" 2021-03-07 10:41:37 +00:00
Pierre Riteau
2b723ead05 Remove whitespace around equal signs in zookeeper.cfg
The merge_configs action plugin is updated with an option to control
whether whitespace should be used around equal signs. The default
remains to use whitespace: only zookeeper.cfg doesn't use them.

This is to avoid issues with the zkCleanup.sh script which expects no
whitespace. The ZooKeeper documentation also uses no whitespace in
configuration file examples.

Change-Id: Ia082a1c002cc4e8b04f7696fdee827b747c6d13f
Closes-Bug: #1917490
2021-03-05 15:12:23 +01:00
Zuul
aad7a731aa Merge "octavia: support tenant management network" 2021-03-05 10:59:49 +00:00
Zuul
9194a3e99b Merge "Fix Cinder log parsing" 2021-03-04 13:03:17 +00:00
Doug Szumski
647ff667e6 Add variable for changing Apache HTTP timeout
In services which use the Apache HTTP server to service HTTP requests,
there exists a TimeOut directive [1] which defaults to 60 seconds. APIs
which come under heavy load, such as Cinder, can sometimes exceed this
which results in a HTTP 504 Gateway timeout, or similar. However, the
request can still be serviced without error. For example, if Nova calls
the Cinder API to detach a volume, and this operation takes longer
than the shortest of the two timeouts, Nova will emit a stack trace
with a 504 Gateway timeout. At some time later, the request to detach
the volume will succeed. The Nova and Cinder DBs then become
out-of-sync with each other, and frequently DB surgery is required.

Although strictly this category of bugs should be fixed in OpenStack
services, it is not realistic to expect this to happen in the short
term. Therefore, this change makes it easier to set the Apache HTTP
timeout via a new variable.

An example of a related bug is here:

https://bugs.launchpad.net/nova/+bug/1888665

Whilst this timeout can currently be set by overriding the WSGI
config for individual services, this change makes it much easier.

Change-Id: Ie452516655cbd40d63bdad3635fd66693e40ce34
Closes-Bug: #1917648
2021-03-04 11:25:06 +00:00
Zuul
1fb56cf5be Merge "Use Docker healthchecks for magnum services" 2021-03-03 17:07:03 +00:00
Mark Goddard
5d3ebc0452 octavia: support tenant management network
- bind health manager port to ovs
- create a octavia-interface.service (used for creating health manager
  interface after reboot)
- used for ci, test or poc

Implements: blueprint implement-automatic-deploy-of-octavia

Change-Id: I8ac30dea6c8402d97189c6b05032c608936b0ff2
Co-Authored-By: wu.chunyang <wuchunyang@yovole.com>
2021-03-03 10:20:40 +08:00
Doug Szumski
fa5511c75d Fix Cinder log parsing
The Cinder API log is currently written to a file called
cinder-wsgi.log, and the WSGI logs to cinder-api.log. Fluentd
then tries to parse the WSGI log as an OpenStack log which
results in 'got incomplete line' errors and prevents proper
ingestion of these logs.

Co-Authored-By: yaoning <yaoning@unitedstack.com>
Closes-Bug: 1916752
Change-Id: I3296dcc4780160cbf88bd18285571276f58bb249
2021-02-24 13:27:00 +00:00
Zuul
c084795c9e Merge "Use trove.conf for all trove services" 2021-02-22 12:57:30 +00:00
wu.chunyang
26a7fc04c6 Use Docker healthchecks for magnum services
This change enables the use of Docker healthchecks for magnum
services.
Implements: blueprint container-health-check

Change-Id: I14d862aa599915c781d02b71a0e57d2124de9abc
2021-02-21 07:05:46 -05:00
wu.chunyang
b567154395 Use trove.conf for all trove services
it was confused to customize opts in trove-conductor.conf
or trove-taskmanager.conf now.
if we want to customize a opts,The operator needs
to know which service is using the configuration opts.
actually trove uses trove.conf is enough for all services
this change combines  all trove config files.

Change-Id: I5a630109e3c4b59bff216146a3ed64c6d47e247f
2021-02-20 10:03:14 -05:00
Zuul
4d4dff0cb8 Merge "Use a better process name for httpd subprocess" 2021-02-20 05:07:48 +00:00
Zuul
87d8bd414d Merge "Add support to OpenID Connect Authentication flow" 2021-02-19 23:15:07 +00:00
Zuul
d3d3cd6b3e Merge "Use Docker healthchecks for manila services" 2021-02-19 20:44:37 +00:00
Zuul
cb4ee5c862 Merge "Add IPv6 configuration options to Octavia management network" 2021-02-19 20:44:28 +00:00
Zuul
4bf52895db Merge "ovn: Fix disabling of gateway chassis" 2021-02-18 12:30:38 +00:00
Zuul
6a6dcfcf28 Merge "Replace db-sock with db-nb-sock and db-sb-sock" 2021-02-18 10:50:04 +00:00
Zuul
90a079b8a7 Merge "Update String type for Monasca ES template" 2021-02-16 17:11:55 +00:00
Michał Nasiadka
ec04972b72 ovn: Fix disabling of gateway chassis
It currently runs on hosts in ovn group, and in case that controllers are not
network gateways - it fails on missing openvswitch.

Change-Id: Ibbf683872337402b4e2a38323bb6a3f35ee4bed4
2021-02-16 17:30:07 +01:00
Zuul
2b906bc382 Merge "Fix Barbican API log config" 2021-02-15 22:24:57 +00:00
Pedro Henrique
f3fbe83708 Add support to OpenID Connect Authentication flow
This pull request adds support for the OpenID Connect authentication
flow in Keystone and enables both ID and access token authentication
flows. The ID token configuration is designed to allow users to
authenticate via Horizon using an identity federation; whereas the
Access token is used to allow users to authenticate in the OpenStack CLI
using a federated user.

Without this PR, if one wants to configure OpenStack to use identity
federation, he/she needs to do a lot of configurations in the keystone,
Horizon, and register quite a good number of different parameters using
the CLI such as mappings, identity providers, federated protocols, and
so on. Therefore, with this PR, we propose a method for operators to
introduce/present the IdP's metadata to Kolla-ansible, and based on the
presented metadata, Kolla-ansible takes care of all of the
configurations to prepare OpenStack to work in a federated environment.

Implements: blueprint add-openid-support
Co-Authored-By: Jason Anderson <jasonanderson@uchicago.edu>
Change-Id: I0203a3470d7f8f2a54d5e126d947f540d93b8210
2021-02-15 16:57:47 -03:00
Zuul
6e157f4716 Merge "Support explicit creation of Monasca Kafka topics" 2021-02-15 16:22:57 +00:00
Zuul
18a395229f Merge "Do not wait for grafana to start when kolla_action=config" 2021-02-15 15:03:52 +00:00
Giacomo Lanciano
486de99dc8 Fix monasca-grafana check
- Increment retries: waiting 20 seconds (i.e., 10 retries) seem to
  be not enough for monasca-grafana to start on the first node.
  Increasing to 80 seconds (i.e., 40 retries) fixes the issue.

- Prevent the check from running when kolla_action=config. In that
  case, the command would never succeed as the service is not
  deployed yet (similarly to
  https://review.opendev.org/c/openstack/kolla-ansible/+/771237).

Closes-Bug: #1915060
Related-Bug: #1821285
Change-Id: I7b42c51a66caed0eccf118615d841dca97a7af9d
2021-02-11 11:27:07 +01:00
Carsten Koester
bf6d9308aa Add IPv6 configuration options to Octavia management network
If the Octavia/Amphora management network is created by Kolla, support
setting the IP address family and IPv6 address/RA mode.

Closes-Bug: 1913409

Change-Id: I9f2ef2196654c91596cb5c4b3c157bcee267226a
2021-02-03 08:24:04 -08:00
LinPeiWen
43e89ddab3 Use Docker healthchecks for manila services
This change enables the use of Docker healthchecks for manila services.
Implements: blueprint container-health-check

Change-Id: I3a2239764b7e3d6db51e535404388a512aba7629
2021-02-03 06:28:52 +00:00
Zuul
db3f0fa08f Merge "Negative seqno need to be considered when comparing seqno" 2021-02-01 12:30:59 +00:00
Zuul
5d612b23de Merge "[docs] Unify project's naming convention" 2021-01-31 21:39:06 +00:00
Zuul
454db5657e Merge "Fix invalid mariadb log options" 2021-01-31 18:08:38 +00:00
fudunwei
068f3fea50 Negative seqno need to be considered when comparing seqno
Need to consider Negative seqno to compare in some cases,
but the task does not support to do that, we need to make it work.

1.we use mariabackup to restore datas on control1, delete the
mariadb data on control2 and control3, and then use cluster recovery,
 as a result that the seqno of the other two nodes will be '-1'.

2. add one more control node into our existing mariadb cluster,
and then use cluster recovery, the seqno of the new node will be '-1'.

Change-Id: Ic1ac8656f28c3835e091637014f075ac5479d390
2021-01-29 13:46:37 +08:00
Piotr Parczewski
5db72659a0 [docs] Unify project's naming convention
There are inconsitencies across the documentation and the source code files
when it comes to project's name (Kolla Ansible vs. Kolla-Ansible). This
commit aims at unifying it so that the naming becomes consistent everywhere.

Change-Id: I903b2e08f5458b1a1abc4af3abefe20b66c23a54
2021-01-27 20:08:41 +01:00
Doug Szumski
1ff4e58d70 Fix Barbican API log config
There are a few issues fixed here:

- The Barbican API service doesn't set a log file, so all the Barbican API
  service logs go to loadwsgi.py.log by default.
- The logs in loadwsgi.py.log are not ingested properly by Fluentd.
- uWSGI logs go to barbican-api.log. This would normally be used as the log
  file for the Barbican API service logs.

This patch makes the following changes to address the above issues:

- All uWSGI logs (from the Emperor and Vassals) go to barbican_api_uwsgi_access.log
  Although these logs aren't strictly all access logs, this follows the existing
  pattern for WSGI logs.
- The Barbican API service logs are written to barbican-api.log instead of
  loadwsgi.py.log. This follows the pattern used by other OpenStack services.
- Fluentd is configured to parse the Barbican API service logs as it would with
  other OpenStack Python services.

Change-Id: I6d03fa8c81c52b6f061514a836bbd15bb6639aaf
Closes-Bug: #1891343
2021-01-27 17:24:58 +00:00
zhouhenglc
21191fb7b3 Replace db-sock with db-nb-sock and db-sb-sock
--db-sock JSON-RPC socket name
--db-nb-sock OVN_Northbound db socket
--db-sb-sock OVN_Southbound db socket [1]
so should use db-nb-sock and db-sb-sock

Closes-bug: #1913031

[1] https://github.com/ovn-org/ovn/blob/master/utilities/ovn-ctl

Change-Id: Ife38237a308c87465d5ac3faf7d8de93fd49de4e
2021-01-27 10:02:56 +00:00
Zuul
01c0c39fb0 Merge "remove the unused variable in mariabackup" 2021-01-25 14:37:29 +00:00
fudunwei
27f8403ad5 remove the unused variable in mariabackup
Remove the unused variable "mariadb_backup_database_address"

Change-Id: If30b166160136c32dd0b892e4093b1798662e872
2021-01-25 14:32:21 +08:00
fudunwei
aec42f0f5f Correct spell error
correct spell 'Cheching' to 'Checking'

Change-Id: I3ceb6960c3b38f371d0d4163ee37d4b34e61f401
2021-01-25 09:58:12 +08:00
Will Szumski
31f97d6cca Do not wait for grafana to start when kolla_action=config
Prior to this change it was not possible to generate the config
before deploying the services as you'd hit:

RUNNING HANDLER [Waiting for grafana to start on first node] *************************
Monday 18 January 2021  15:06:35 +0000 (0:00:00.182)       0:04:39.213 ********
skipping: [sv-h22a8-u19]
skipping: [sv-h22a5-u36]
FAILED - RETRYING: Waiting for grafana to start on first node (10 retries left).

This would never succeed as the service has not yet been deployed.

TrivialFix
Change-Id: I9437a049b24e5e613a7e66add481a8983b84867a
2021-01-18 15:42:31 +00:00
Zuul
031e337898 Merge "Add Prometheus 2.x deployment" 2021-01-15 11:57:52 +00:00
Zuul
4d43c859cd Merge "Fix dpdk deploy failed" 2021-01-12 13:46:30 +00:00
Zuul
cf0aa0f6af Merge "Use Docker healthchecks for cloudkitty services" 2021-01-12 13:46:13 +00:00
Zuul
07659dd96f Merge "Register resources info for octavia upgrading" 2021-01-12 13:45:57 +00:00
Zuul
f6ddf564b6 Merge "Fix remove libvirt apparmor disabled profile" 2021-01-12 13:35:03 +00:00
Piotr Parczewski
1bdd8ea984 Add Prometheus 2.x deployment
It is now possible to deploy either 1.x or 2.x version of Prometheus.
The new 2.x version introduces breaking changes in terms of storage
format and command line options.

Change-Id: I80cc6f1947f3740ef04b29839bfa655b14fae146
Co-Authored-By: Radosław Piliszek <radoslaw.piliszek@gmail.com>
2021-01-12 14:17:49 +01:00
Doug Szumski
e689f951f4 Support explicit creation of Monasca Kafka topics
With this patch, Monasca no longer relies on automatic topic creation
in Kafka, and instead pre-creates all topics before bringing up the
containers. If the topic already exists then it will not be
changed, therefore existing users are not affected.

This patch allows per topic customisations, such as increasing the
number of partitions on particular topics and also works around
a race condition in automatic topic creation where multiple instances
of the same service could race to create a topic causing some of the
services to restart and throw an error before resuming normal
operation.

Change-Id: Ib15c95bb72cf79e9e55945d757b248e06f5f4065
2021-01-11 09:47:31 +00:00
wu.chunyang
7f7bb1b448 Register resources info for octavia upgrading
kolla-ansible upgrade failed when octavia_auto_configure set
to true. because upgrade action don't register the resources
info.
this change adds some tasks to query the resources info
for upgrade action in octavia role.

Change-Id: I4b0ac001b38bee81d983dd68534b9d0e78b4f6d7
2021-01-09 18:34:49 +08:00
Victor Morales
891ec51dd4 Fix remove libvirt apparmor disabled profile
The bootstrap process tries to removes existing apparmor profiles but
doesn't consider the case where those are disabled. This change fixes
the scenario where the libvirt profile exists but is disabled.

Closes-Bug: 1909874
Change-Id: Ied0f2acc420bd5cf1e092c8aee358cba35bd8d5d
2021-01-08 10:44:00 -08:00
wu.chunyang
e6e7e4d5d6 Use Docker healthchecks for cloudkitty services
This change enables the use of Docker healthchecks for cloudkitty
services.
Implements: blueprint container-health-check

Change-Id: I19892035382ffff5200e88da53408a19e72c9d68
2021-01-07 23:15:53 +08:00